/external/wpa_supplicant/ |
D | ms_funcs.c | 58 void nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 64 if (password_len > 256) in nt_password_hash() 68 for (i = 0; i < password_len; i++) { in nt_password_hash() 73 len = password_len * 2; in nt_password_hash() 122 const u8 *password, size_t password_len, in generate_nt_response() argument 130 nt_password_hash(password, password_len, password_hash); in generate_nt_response() 224 void generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 231 nt_password_hash(password, password_len, password_hash); in generate_authenticator_response() 247 size_t password_len, u8 *response) in nt_challenge_response() argument 250 nt_password_hash(password, password_len, password_hash); in nt_challenge_response() [all …]
|
D | eap_otp.c | 44 size_t password_len, len; in eap_otp_process() local 57 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 61 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 79 password_len, EAP_CODE_RESPONSE, req->identifier, in eap_otp_process() 83 os_memcpy(rpos, password, password_len); in eap_otp_process() 85 password, password_len); in eap_otp_process()
|
D | eap_leap.c | 74 size_t identity_len, password_len; in eap_leap_process_request() local 79 password = eap_get_config_password(sm, &password_len); in eap_leap_process_request() 126 nt_challenge_response(challenge, password, password_len, rpos); in eap_leap_process_request() 201 size_t password_len; in eap_leap_process_response() local 205 password = eap_get_config_password(sm, &password_len); in eap_leap_process_response() 242 nt_password_hash(password, password_len, pw_hash); in eap_leap_process_response() 278 size_t len, password_len; in eap_leap_process() local 281 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 335 size_t elen[5], password_len; in eap_leap_getKey() local 340 password = eap_get_config_password(sm, &password_len); in eap_leap_getKey() [all …]
|
D | eap_gtc.c | 59 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 86 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 90 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 107 plen = password_len; in eap_gtc_process() 124 os_memcpy(rpos, password, password_len); in eap_gtc_process()
|
D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 38 size_t password_len, u8 *response); 42 void nt_password_hash(const u8 *password, size_t password_len,
|
D | eap_mschapv2.c | 183 const u8 *password, size_t password_len, in eap_mschapv2_derive_response() argument 196 password, password_len); in eap_mschapv2_derive_response() 199 password, password_len, nt_response); in eap_mschapv2_derive_response() 204 generate_authenticator_response(password, password_len, in eap_mschapv2_derive_response() 212 nt_password_hash(password, password_len, password_hash); in eap_mschapv2_derive_response() 230 size_t username_len, identity_len, password_len; in eap_mschapv2_challenge_reply() local 236 password = eap_get_config_password(sm, &password_len); in eap_mschapv2_challenge_reply() 284 password, password_len, in eap_mschapv2_challenge_reply() 380 config->password_len = config->new_password_len; in eap_mschapv2_password_changed() 573 size_t username_len, password_len, new_password_len; in eap_mschapv2_change_password() local [all …]
|
D | eap_md5.c | 45 size_t len, challenge_len, password_len; in eap_md5_process() local 49 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 104 elen[1] = password_len; in eap_md5_process()
|
D | eap_ttls.c | 707 config->password, config->password_len); in eap_ttls_phase2_request_mschapv2() 710 config->password, config->password_len, in eap_ttls_phase2_request_mschapv2() 713 generate_authenticator_response(config->password, config->password_len, in eap_ttls_phase2_request_mschapv2() 722 nt_password_hash(config->password, config->password_len, in eap_ttls_phase2_request_mschapv2() 803 config->password, config->password_len, in eap_ttls_phase2_request_mschap() 806 config->password, config->password_len); in eap_ttls_phase2_request_mschap() 844 pos = buf = os_malloc(config->identity_len + config->password_len + in eap_ttls_phase2_request_pap() 859 pad = (16 - (config->password_len & 15)) & 15; in eap_ttls_phase2_request_pap() 861 config->password_len + pad); in eap_ttls_phase2_request_pap() 862 os_memcpy(pos, config->password, config->password_len); in eap_ttls_phase2_request_pap() [all …]
|
D | config_ssid.h | 260 size_t password_len; member
|
D | eap_pax.c | 93 len[0] = config->password_len; in eap_pax_init()
|
D | ctrl_iface.c | 161 ssid->password_len = os_strlen(pos); in wpa_supplicant_ctrl_iface_ctrl_rsp()
|
D | eap.c | 1769 *len = config->password_len; in eap_get_config_password()
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
D | pkcs_5_2.c | 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2() 95 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
|
D | pkcs_5_1.c | 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { in pkcs_5_alg1()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_pkcs.h | 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 4778 unsigned long password_len, 4801 unsigned long password_len, 4824 unsigned long outlen, password_len, salt_len; 4832 if ((err = pkcs_5_alg2(password, password_len, salt,
|